Network Forensics Analysis with Evidence Graphs (Demo Proposal)

Size: px
Start display at page:

Download "Network Forensics Analysis with Evidence Graphs (Demo Proposal)"

Transcription

1 Network Forensics Analysis with Evidence Graphs (Demo Proposal) Wei Wang and Thomas E. Daniels Department of Electrical and Computer Engineering Iowa State University Ames, Iowa Abstract We develop a prototype network forensics analysis tool that integrates presentation, manipulation and automated reasoning of intrusion evidence. We propose the evidence graph as a novel graph model to facilitate the presentation and manipulation of intrusion evidence. For automated evidence analysis, we develop a hierarchical reasoning framework that includes local reasoning and global reasoning. In local reasoning, we apply Rule-based Fuzzy Cognitive Maps (RBFCM) to model the state evolution of suspicious hosts. In global reasoning, we aim to identify group of strongly correlated hosts in the attack and derive their relationships in the attack scenario. Our analysis mechanism effectively integrates analyst feedbacks into the automated reasoning process. Experimental results demonstrate the potential of our proposed techniques. I. INTRODUCTION Our work is motivated by the requirements of network forensics analysis. Current practices in network forensics analysis are to manually examine logs, a time-consuming and error prone process [12]. To effectively assist the forensics analyst, we argue that network forensics analysis mechanisms should meet the following essential needs: Short response times: Large volume of irrelevant information and increasingly complex attack strategies make manual analysis impossible in a timely manner. Automated evidence analysis would produce an immediate impact on law enforcement s ability to reduce response times. Friendly interface: Intrusion evidence and analysis results should be presented in an intuitive approach. The adhoc nature of cyber attacks indicates that expert opinion and out-of-band information must be efficiently integrated into the automated reasoning process. In view of these requirements, we develop a prototype network forensics analysis mechanism that integrates novel techniques for evidence presentation, interaction and automated reasoning. We propose the evidence graph model as an intuitive approach to present and manipulate intrusion evidence. Based on the evidence graph, we develop a hierarchical reasoning framework for automated evidence analysis. Our evidence analysis mechanism focus on identifying the group of hosts involved in the attack and determining the roles of each host in the group, which would help to answer questions like: How likely is a specific host relevant to the attack? What is the role the host played in the attack? How strongly are two hosts M and N connected in the attack? In summary, our prototype tool has the following features: 1) A flexible pre-processing mechanism to reduce redundancy in intrusion alerts; 2) A novel graph model that facilitates effective presentation and interaction with intrusion evidence; 3) A hierarchical reasoning framework for automated inference of attack group identification and scenario reconstruction. We have submitted a full paper containing this information to ACSAC 05 [21]. II. NETWORK FORENSICS ANALYSIS MECHANISM Fig. 1. Network Forensics Analysis Mechanism Figure 1 shows the architecture of our network forensics analysis tool. Functionalities of each component is briefly described as follows: 1) Evidence collection module collects intrusion evidence from networks and hosts under investigation. 2) Evidence preprocessing module parses certain types of evidence like intrusion alerts into desired format and aggregates low level evidence into high level ones to reduce redundancy. 3) Attack knowledge base provides prior knowledge of known exploits. 4) Assets knowledge base provides prior knowledge of the networks and hosts under investigation. New Orleans, LA 1

2 5) Evidence graph generation module generates a graph representation of evidence in the depository based on our evidence graph model. 6) Attack reasoning module performs automated reasoning based on the evidence graph. 7) Analyst interface module provides visualization of evidence graph and reasoning results to the analyst and passes analyst feedbacks to the graph generation and reasoning module. In the initial phase, the intrusion evidence collected are preprocessed and stored into the evidence depository. Next, the graph generation module constructs the evidence graph with evidences retrieved from the depository. Following that, the reasoning module performs automated inference based on the evidence graph and present results to the analyst. Through the interface module, the analyst could provide expert opinions and out-of-band information in two approaches: (1) directly edit the evidence graph (2) send queries to retrieve specific evidence. The reasoning process is then performed on the updated evidence graph for improved results. A. Sources of Intrusion Evidence Evidences for network forensics investigation can be classified into two categories: primary evidence and secondary evidence. Primary evidence refer to information that directly indicate attacks or security policy violations. For example, alerts from IDS and system integrity monitors are primary evidence. Secondary evidence refer to information that does not directly represent attacks but could provide complementary information for investigation. For example, raw network flow logs and host configurations are secondary evidence. Secondary evidence comes from extensive sources and in a much higher volume. Generally, primary evidence is the starting point of forensic investigation and provides the basis for searches towards secondary evidence. Querying the secondary evidence usually has two objectives: to discover hidden suspicious events and to evaluate the trustworthyness of primary evidence. In our current prototype, we use network IDS alerts as the primary evidence; raw network flow logs and host logs are used as secondary evidence. B. Evidence Preprocessing We apply the Leader-Follower model to aggregate raw IDS alerts into high level hyper alerts. The flexible alert aggregation algorithm merges raw alerts based on similarity of attributes with self-extending time window. Details of the Leader-Follower algorithm is described in [21]. C. Evidence Graph Model We defined the evidence graph model to present the observed intrusion evidences as well as perform automated inference. An evidence graph is a quadruple G= (N, E, S, R), where N is the set of nodes, E is the set of directed edges, S is the set of labels that indicate the status of nodes and R is the set of labels that indicate the attributes of edges. In the evidence graph, each node represents a host of forensic investigation interest and each edge represents an observed intrusion evidence. Functionalities of our evidence graph model are: 1) The evidence graph provides the analyst an intuitive visualization of observed evidence; 2) The evidence graph provides a convenient interface for the analyst to interact with the evidence and add expert feedback. 3) The evidence graph provides the basis for automated reasoning procedure. Each node in the evidence graph is characterized by the following labels: 1) Host: The suspicious host of interest. 2) States: States of the node is defined by a set of fuzzy variables S={Attacker,Victim,Stepping Stone,Affiliated}. The states are inferred through our local reasoning process via Rule-Based Fuzzy Cognitive Maps (RBFCM). We argue that it is essential to keep track of the evolution of host states because it provide context for evaluating evidence and helps to display the advancing stages of an attack to the forensic analyst. Each edge in the evidence graph is represented by the following labels: 1) General attributes: The set of general attributes of an edge depends on the specific type of intrusion evidence. For network IDS alerts, we define the set of attributes as source/ target IP address, time stamp and classification. Time stamp of the edge is an interval [start time, end time]. 2) Weight: Weight is a fuzzy value w [0, 1] that represents the impact of evidence on the target system. 3) Host Importance: Host importance h [0, 1] is an optional parameter to relate importance of evidence with certain hosts. 4) Relevancy: Relevancy is a fuzzy value r [0, 1] that represents the belief that the attack indicated by the evidence would successfully achieve expected impact on the target host. We calculate priority score for an edge to indicate the overall importance of the evidence in the attack context. The priority score p(e) of an edge e is calculated as the product of its weight, relevancy and host importance. D. Hierarchical Reasoning Framework Based on the evidence graph, we develop a hierarchical reasoning framework of two levels: local reasoning and global reasoning. 1) Local Reasoning: The objective of local reasoning is to infer the state evolution of a host from observed evidence. In the current prototype,we develop causal inference via Rule- Based Fuzzy Cognitive Maps (RBFCM) to model the states of nodes. A RBFCM is essentially a standard rule based fuzzy system plus feedback and mechanisms to deal with causal relations [2]. As shown in figure 2, a RBFCM consists of fuzzy concepts and fuzzy rule bases. In our context, concepts are the New Orleans, LA 2

3 defined states {Attacker, Victim, Stepping Stone, Affiliated}. Fuzzy rule bases consist of IF...Then... fuzzy rules that define how each concept is affected by other concepts and inputs. The fuzzy rules are designed from expert knowledge. Fig. 2. RBFCM model for local reasoning In the RBFCM shown in figure 2, fuzzy rules are used to map multiple inputs (current value of states and new evidence) to the output(updated value of states). States of a node in the evidence graph is updated in an incremental manner. 2) Global Reasoning: The objective of global reasoning is to identify a set of highly correlated hosts that belongs to the attack scenario of interest and derive their relationships by refining the local role estimates to properly fit into the scenario context. Based on the evidence graph, we approach the global reasoning task as a group detection problem, which is to discover potential members of an attack group given the intrusion evidence observed. The attack group detection procedure works in two different phases: (1) creating new attack groups by selecting seed for the group and (2) extending existing groups by discovering more hidden members. In the following we present our approach in these two tasks. 1) Seed Selection: The first phase of group detection is to select certain node as seed of the attack group. In our prototype tool, there two approaches for seed generation: (1) select seed based on states and context of nodes; (2) select seed based on certain graph metrics. 2) Group Expansion: The attack group expansion procedure is based on the intuitive notion that members of the same attack group should be strongly connected with each other. Based on the evidence graph,we compute the distance between two nodes and larger score indicates stronger correlation between two nodes in the attack. The distance between two nodes in the evidence graph is evaluated as the reciprocal of aggregated priority scores between them. In the group expansion process, we first identify all external neighbors of current seed members as the list of candidate nodes. In the second step, a ranked list is formed based on the distance between each candidate node to current group members; Finally, the ordered list is cut at a predefined threshold and nodes within the distance threshold are added to the group as new seed members of the group. If no candidate nodes is within the distance threshold, the group expansion procedure terminates. III. RELATED WORK Our work extends current work in several areas into a flexible network forensics analysis mechanism. Intrusion Detection Systems: Intrusion detection techniques have been widely studied since the early 1980 s. Generally they are classified into two categories: anomaly detection and misuse detection [9]. IDS are an important source of evidence for forensics analysis. However we cannot solely rely on IDS as they only catch known attacks or unusual behavior. Also, the high volume and low quality of IDS alerts makes it difficult for forensics investigators to identify a clear picture of the attack. We incorporate aggregated IDS alerts into our evidence graph model and evaluate their effects in reasoning process. Attribution Techniques: Attack attribution techniques aim to locate the true origin of attack flows. IP spoofing and stepping stone connections are two common techniques attackers use to conceal their origin [7]. Therefore, attribution techniques generally fall into two classes: stepping stone detection [22] [24] and IP traceback [1], [8], [12], [19]. Attribution methods can be integrated into our analysis model as evidence sources on query. In future work, we will incorporate results of stepping stone detection and IP traceback into our local and global reasoning process. Alert Correlation: As intrusion alerts only reflect elementary steps in an attack, alert correlation methods aim at reconstructing the attack scenario by linking alerts that satisfy certain relationships together. Past work on alert correlation include attribute similarity based [3], [5], [13], [14], [20], predefined scenario based [6], [10], [11], [15], pre/post condition based [4], [17], [18] and methods based on multiple information sources [16]. We extend a simple and flexible attribute-based alert aggregation mechanism derived from [20] in our evidence pre-processing module. Pre/post condition and predefined scenario based methods can be leveraged to calculate correlation scores in our global reasoning process. Our evidence graph model provides an intuitive view to correlate intrusion alerts with secondary evidence. IV. EXPERIMENTAL RESULTS In our current prototype, we use Snort as the network IDS sensor to generate intrusion alerts and use TCPDUMP to collect raw network traffic in the testbed. Evidence collected are stored into a MySQL database. We implemented a set of Perl scripts to aggregate intrusion alerts, extract flow information and automatically integrate prior knowledge in reasoning process. We develop an application based on LEDA library to manipulate evidence graphs and reasoning results. In the following example, we illustrate our analysis procedure step by step and show results of local and global reasoning in detail. New Orleans, LA 3

4 A. Scenario Setup A simple multi-stage attack scenario is implemented in our testbed. The attack group involved in the scenario consists of five hosts in separate subnets. Roles of hosts in the attack group is shown in table I. In addition to two stepping stones, the attacker also uses one third party host that has public ftp service as the relay for attack tools and stolen data. TABLE I ROLE CONFIGURATION OF HOSTS Attacker Stepping Stone Stepping Stone Victim FTP Relay Fig. 3. Evidence Graph from primary evidence The attack scenario includes the following steps: 1) Samba remote buffer overflow attack against stepping stone 1 from attacker. The attack is successful and a shell of stepping stone 1 is obtained. 2) Download attack tools from ftp relay to stepping stone 1 and start an Netcat backdoor on stepping stone 1. Establish connection from attacker to stepping stone 1 through the backdoor. 3) Windows DCOM remote buffer overflow attack against stepping stone 2 from stepping stone 1. The attack is successful and a shell of stepping stone 2 is obtained. 4) Download attack tools from ftp relay to stepping stone 2 and starts a backdoor on stepping stone 2. Establish backdoor connection from stepping stone 1 to stepping stone 2. 5) Frontpage Server 2000 buffer overflow attack against the victim from stepping stone 2. The attack is successful and a shell of stepping stone 2 is obtained. 6) Download backdoor program from ftp relay to victim and starts backdoor on victim. 7) Transfer data from the victim to the ftp relay and close backdoor connections. B. Evidence Preprocessing Throughout the attack process, Snort reported a huge number of 7501 alerts. With our aggregation procedure, the alerts information is highly condensed. The result is 4 hyperalerts related to port scan activity and 17 hyper-alerts which represent possible exploits. C. Constructing Evidence Graph Based on the primary evidence of intrusion alerts, our graph generation module generated the initial evidence graph shown in figure 3. The number attached with each edge denotes the sequence of corresponding evidences in time order. Note that there s no exploit activities involved with the ftp relay, therefore it does not show up in the initial evidence graph. To get a clearer view, the analyst can apply filter conditions to remove irrelevant evidences. On the other hand, the analyst can specify queries for secondary evidence to provide a more Fig. 4. Enriched Evidence Graph with secondary evidence comprehensive view of what s going on in the network. For example, based on figure 3, we can ignore all port scan attacks and find out all file transfer connections to hosts in the evidence graph during a specified time window and get an updated evidence graph in figure 4. We notice that several potentially suspicious hosts include the ftp relay are brought up in the updated evidence graph. Specific alerts in figure 3 are replaced by abstractions from the knowledge base to offer a high level picture in figure 4. D. Local Reasoning In the first step, the analyst would examine the states of hosts from local reasoning process. Based on the RBFCMbased local reasoning procedure, states of nodes in the evidence graph are inferred and shown in table II. The hosts that have Attacker state activated are highlighted in figure 3 and figure 4. E. Global Reasoning First, we use degree of a node as the metrics to generate the initial seed for attack group. From table II we can see that host has the highest degree, thus we choose it as the initial seed for attack group. In the next step, we expand the group by evaluating the distance between candidate nodes to seeds of the group. Distance between neighbor pairs are shown in table III. Starting New Orleans, LA 4

5 TABLE II LOCAL REASONING RESULTS Host degree AT VI SS AF from the seed, the attack group is expanded incrementally. With distance threshold as 1, the result attack group is shown in figure 5. The highlighted oval node indicates the initial seed of the attack group and the highlighted square nodes are members of the attack group identified through the group expansion process. Each edge in figure 5 are labelled with distance between its source and target. TABLE III DISTANCE BETWEEN PAIR OF NODES Host 1 Host 2 Distance By observing the states of members in the attack group we can see that host has only Attacker state activated. Hosts , both have Stepping Stone state activated. Host has both Attacker and Victim state activated but not Stepping Stone. Further examination of the activation time of states clearly suggest that host is the initial start point of attack and hosts , are used as stepping stones. Both and are affiliated with attacker and stepping stones, which suggest that more investigation is needed to find out whether they are truly related to the attack. Intuitively from the graph we can see that seems more suspicious than because it is affiliated with more members in the attack group. We can also Fig. 5. Initial Seed and Attack Group for the scenario observe that although is labelled as an Attacker in local reasoning process, it is unrelated to the main attack group. Thus we can regard it as a background attacker when investigating the main attack group. The results show that with sufficient evidence, our automated analysis mechanism is effective in discovering attack group and high-level scenario of the attack. V. SUMMARY We develop a prototype network forensics analysis tool that integrates automated reasoning with convenient presentation and interaction with intrusion evidence. This work is only the starting point of our efforts towards network forensics analysis. We expect to interact with forensics experts in the demonstration and evaluate our techniques with more realistic experiments. REFERENCES [1] Steven M. Bellovin. Internet draft: ICMP traceback messages. Available at March [2] J. P. Carvalho and J. A. B. Tome. Rule Based Fuzzy Cognitive Maps: Fuzzy Causal Relations. In Proceedings of the 8th International Fuzzy Systems Association World Congress(IFSA99), Taiwan, [3] F. Cuppens. Managing alerts in a multi-intrusion detecttion environment. In Proceedings of the 17th Annual Computer Security Applications Conference(ACSAC), [4] F. Cuppens and A. Miege. Alert Correlation in a Cooperative Intrusion Detection Framework. In Proceedings of the 2002 IEEE Symposium on Security and Privacy, May [5] O. Dain and R. Cunningham. Building scenarios from a heterogeneous alert stream. In Proceedings of the 2001 IEEE workshop on Information Assurance and Security, pages , [6] O. Dain and R. Cunningham. Fusing a heterogeneous alert stream into scenarios. In Proceedings of the 2001 ACM workshop on Data Mining for Security Applications, pages , [7] Thomas E. Daniels. Reference Models for the Concealment and Observation of Origin Identity in Store-and-Forward Networks. PhD thesis, Purdue University, West Lafayette,Indiana, [8] Drew Dean, Matt Franklin, and Adam Stubblefield. An algebraic approach to ip traceback. In Proceedings of 2001 Network and Distributed Systems Security Symposium, pages 3 12, San Diego, California, February [9] H. Debar, M. Dacer, and A. Wespi. A revised taxonomy for intrusiondetection systems. In IBM Research Report, [10] Herve Debar and Andreas Wespi. Aggregation and Correlation of Intrusion-Detection Alerts. In Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection(RAID), October New Orleans, LA 5

6 [11] S. Eckmann, G. Vigna, and R. Kemmerer. Statl: An attack language for state-based intrusion detection. Dept. of Computer Science, University of California, Santa Barbara., [12] Institute for Security Technology Studies. Law enforcement tools and technologies for investigating cyber attacks: Gap analysis report. February [13] K. Julisch. Mining alarm clusters to improve alarm handling efficiency. In Proceedings of the 17th Annual Computer Security Applications Conference(ACSAC), pages 12 21, [14] K. Julisch. Clustering intrusion detection alarms to support root cause analysis. In ACM Transactions on Information and System Security, pages , Nov [15] B. Morin and H. Debar. Correlation of intrusion symptoms: an application of chronicles. In Proceedings of the 6th International Symposium on Recent Advances in Intrusion Detection(RAID 03), [16] Benjamin Morin, Ludovic Me, Herve Debar, and Mireille Ducasse. M2D2: A Formal Data Model for IDS Alert Correlation. In Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection, pages , [17] P. Ning, Y. Cui, and D. S. Reeves. Constructing attack scenarios through correlation of intrusion alerts. In 9th ACM Conference on Computer and Communicaitons Security, November [18] P. Ning and D. Xu. Learning attack stratagies from intrusion alerts. In Proceedings of the 10th ACM Conference on Computer and Communicaitons Security, , [19] Alex C. Snoeren, Craig Partridge, Luis A. Sanchez, Christine E. Jones, Fabrice Tchakountio, Beverly Schwartz, Stephen T. Kent, and W. Timothy Strayer. Single-packet ip traceback. IEEE/ACM Trans. Netw., 10(6): , [20] A. Valdes and K. Skinner. Probablistic alert correlation. In Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection(RAID), October [21] Wei Wang and Thomas E. Daniels. Building evidence graphs for network forensics analysis. Submitted to 21st Annual Computer Security Applications Conference(ACSAC 05). [22] X. Wang and D. S. Reeves. Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays. In Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS 2003), Washington DC, USA, Oct [23] K. Yoda and H. Etoh. Finding a connection chain for tracing intruders. In Proceedings of the 6th European Symposium on Research in Computer Security (ESORICS 2000), Toulouse, France, Oct [24] Y. Zhang and V. Paxson. Detecting stepping stones. In Proceedings of the 9th USENIX Security Symposium, pages , Denver, USA, Aug New Orleans, LA 6

Intrusion Alert Correlation Technique Analysis for Heterogeneous Log

Intrusion Alert Correlation Technique Analysis for Heterogeneous Log 132 Intrusion Correlation Analysis for Heterogeneous Log Robiah Yusof, Siti Rahayu Selamat, Shahrin Sahib Faculty of Information Technology and Communication, Universiti Teknikal Malaysia Melaka, Ayer

More information

INTRUSION DETECTION ALARM CORRELATION: A SURVEY

INTRUSION DETECTION ALARM CORRELATION: A SURVEY INTRUSION DETECTION ALARM CORRELATION: A SURVEY Urko Zurutuza, Roberto Uribeetxeberria Computer Science Department, Mondragon University Mondragon, Gipuzkoa, (Spain) {uzurutuza,ruribeetxeberria}@eps.mondragon.edu

More information

A graph oriented approach for network forensic analysis

A graph oriented approach for network forensic analysis Iowa State University Digital Repository @ Iowa State University Graduate Theses and Dissertations Graduate College 2010 A graph oriented approach for network forensic analysis Wei Wang Iowa State University

More information

Layered Approach of Intrusion Detection System with Efficient Alert Aggregation for Heterogeneous Networks

Layered Approach of Intrusion Detection System with Efficient Alert Aggregation for Heterogeneous Networks Layered Approach of Intrusion Detection System with Efficient Alert Aggregation for Heterogeneous Networks Lohith Raj S N, Shanthi M B, Jitendranath Mungara Abstract Protecting data from the intruders

More information

Firewalls and intrusion detection systems

Firewalls and intrusion detection systems Firewalls and intrusion detection systems Markus Peuhkuri 2005-03-22 Lecture topics Firewalls Security model with firewalls Intrusion detection systems Intrusion prevention systems How to prevent and detect

More information

False Alert Reduction and Correlation for Attack Scenarios with Automatic Time Window

False Alert Reduction and Correlation for Attack Scenarios with Automatic Time Window False Alert Reduction and Correlation for Attack Scenarios with Automatic Time Window M. Logaprakash Department of CSE (PG) Sri Ramakrishna Engineering College Coimbatore, India Abstract - The Intrusion

More information

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

A Review of Anomaly Detection Techniques in Network Intrusion Detection System A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In

More information

Efficient Security Alert Management System

Efficient Security Alert Management System Efficient Security Alert Management System Minoo Deljavan Anvary IT Department School of e-learning Shiraz University Shiraz, Fars, Iran Majid Ghonji Feshki Department of Computer Science Qzvin Branch,

More information

Application of Data Mining Techniques in Intrusion Detection

Application of Data Mining Techniques in Intrusion Detection Application of Data Mining Techniques in Intrusion Detection LI Min An Yang Institute of Technology leiminxuan@sohu.com Abstract: The article introduced the importance of intrusion detection, as well as

More information

131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10

131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10 1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom

More information

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE PRODUCT BRIEF LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE The Tripwire VIA platform delivers system state intelligence, a continuous approach to security that provides leading indicators of breach

More information

ForNet: A Distributed Forensic Network

ForNet: A Distributed Forensic Network ForNet: A Distributed Forensic Network Kulesh Shanmugasundaram Polytechnic University 1 Problem and Motivation Security fails. Thousands of reported security breaches, worms, and viruses attest to this

More information

Intrusion Detection Systems with Correlation Capabilities

Intrusion Detection Systems with Correlation Capabilities Intrusion Detection Systems with Correlation Capabilities Daniel Johansson danjo133@student.liu.se Pär Andersson paran213@student.liu.se Abstract Alert correlation in network intrusion detection systems

More information

Attack Signature Matching and Discovery in Systems Employing Heterogeneous IDS

Attack Signature Matching and Discovery in Systems Employing Heterogeneous IDS Attack Signature Matching and Discovery in Systems Employing Heterogeneous IDS Nathan Carey, George Mohay and Andrew Clark Queensland University of Technology nl_carey@yahoo.com.au, g.mohay@qut.edu.au,

More information

Network Intrusion Simulation Using OPNET

Network Intrusion Simulation Using OPNET Network Intrusion Simulation Using OPNET Shabana Razak, Mian Zhou, Sheau-Dong Lang* School of Electrical Engineering & Computer Science and National Center for Forensic Science* University of Central Florida,

More information

LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE

LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE PRODUCT BRIEF LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE As part of the Tripwire VIA platform, Tripwire Log Center offers out-of-the-box integration with Tripwire Enterprise to offer visibility

More information

Implementing Large-Scale Autonomic Server Monitoring Using Process Query Systems. Christopher Roblee Vincent Berk George Cybenko

Implementing Large-Scale Autonomic Server Monitoring Using Process Query Systems. Christopher Roblee Vincent Berk George Cybenko Implementing Large-Scale Autonomic Server Monitoring Using Process Query Systems Christopher Roblee Vincent Berk George Cybenko These slides are based on the paper Implementing Large-Scale Autonomic Server

More information

On A Network Forensics Model For Information Security

On A Network Forensics Model For Information Security On A Network Forensics Model For Information Security Ren Wei School of Information, Zhongnan University of Economics and Law, Wuhan, 430064 renw@public.wh.hb.cn Abstract: The employment of a patchwork

More information

RESEARCH PROPOSAL: AN INTRUSION DETECTION SYSTEM ALERT REDUCTION AND ASSESSMENT FRAMEWORK BASED ON DATA MINING

RESEARCH PROPOSAL: AN INTRUSION DETECTION SYSTEM ALERT REDUCTION AND ASSESSMENT FRAMEWORK BASED ON DATA MINING Journal of Computer Science, 9 (4): 421-426, 2013 ISSN 1549-3636 2013 doi:10.3844/jcssp.2013.421.426 Published Online 9 (4) 2013 (http://www.thescipub.com/jcs.toc) RESEARCH PROPOSAL: AN INTRUSION DETECTION

More information

Alarm Clustering for Intrusion Detection Systems in Computer Networks

Alarm Clustering for Intrusion Detection Systems in Computer Networks Alarm Clustering for Intrusion Detection Systems in Computer Networks Giorgio Giacinto, Roberto Perdisci, Fabio Roli Department of Electrical and Electronic Engineering, University of Cagliari Piazza D

More information

Title: Alert Correlation in Collaborative Intelligent Intrusion Detection Systems-ASurvey

Title: Alert Correlation in Collaborative Intelligent Intrusion Detection Systems-ASurvey Title: Alert Correlation in Collaborative Intelligent Intrusion Detection Systems-ASurvey Authors: Izzeldin Mohamed Osman, Huwaida Tagelsir Elshoush PII: S1568-4946(10)00311-X DOI: doi:10.1016/j.asoc.2010.12.004

More information

A Survey of IP Traceback Mechanisms to overcome Denial-of-Service Attacks

A Survey of IP Traceback Mechanisms to overcome Denial-of-Service Attacks A Survey of IP Traceback Mechanisms to overcome Denial-of-Service Attacks SHWETA VINCENT, J. IMMANUEL JOHN RAJA Department of Computer Science and Engineering, School of Computer Science and Technology

More information

Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP

Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Aakanksha Vijay M.tech, Department of Computer Science Suresh Gyan Vihar University Jaipur, India Mrs Savita Shiwani Head Of

More information

Web Forensic Evidence of SQL Injection Analysis

Web Forensic Evidence of SQL Injection Analysis International Journal of Science and Engineering Vol.5 No.1(2015):157-162 157 Web Forensic Evidence of SQL Injection Analysis 針 對 SQL Injection 攻 擊 鑑 識 之 分 析 Chinyang Henry Tseng 1 National Taipei University

More information

IDS Interoperability and Correlation Using IDMEF and Commodity Systems

IDS Interoperability and Correlation Using IDMEF and Commodity Systems IDS Interoperability and Correlation Using IDMEF and Commodity Systems Nathan Carey, Andrew Clark and George Mohay Information Security Research Centre, Faculty of Information Technology, Queensland University

More information

Event-based alert correlation system to detect SQLI activities 1 Faeiz Alserhani

Event-based alert correlation system to detect SQLI activities 1 Faeiz Alserhani 2011 International Conference on Advanced Information Networking and Applications Event-based alert correlation system to detect SQLI activities 1 Faeiz Alserhani 2 Monis Akhlaq 3 Irfan U Awan 4 Andrea

More information

THE ROLE OF IDS & ADS IN NETWORK SECURITY

THE ROLE OF IDS & ADS IN NETWORK SECURITY THE ROLE OF IDS & ADS IN NETWORK SECURITY The Role of IDS & ADS in Network Security When it comes to security, most networks today are like an egg: hard on the outside, gooey in the middle. Once a hacker

More information

An Overview of the Bro Intrusion Detection System

An Overview of the Bro Intrusion Detection System An Overview of the Bro Intrusion Detection System Brian L. Tierney, Vern Paxson, James Rothfuss Lawrence Berkeley National Laboratory Typical Approach: Firewall with default deny policy A blocking router

More information

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Prashil S. Waghmare PG student, Sinhgad College of Engineering, Vadgaon, Pune University, Maharashtra, India. prashil.waghmare14@gmail.com

More information

Flexible Web Visualization for Alert-Based Network Security Analytics

Flexible Web Visualization for Alert-Based Network Security Analytics Flexible Web Visualization for Alert-Based Network Security Analytics Lihua Hao 1, Christopher G. Healey 1, Steve E. Hutchinson 2 1 North Carolina State University, 2 U.S. Army Research Laboratory lhao2@ncsu.edu

More information

Intrusion Detection Systems (IDS)

Intrusion Detection Systems (IDS) Intrusion Detection Systems (IDS) What are They and How do They Work? By Wayne T Work Security Gauntlet Consulting 56 Applewood Lane Naugatuck, CT 06770 203.217.5004 Page 1 6/12/2003 1. Introduction Intrusion

More information

A Frequency-Based Approach to Intrusion Detection

A Frequency-Based Approach to Intrusion Detection A Frequency-Based Approach to Intrusion Detection Mian Zhou and Sheau-Dong Lang School of Electrical Engineering & Computer Science and National Center for Forensic Science, University of Central Florida,

More information

STANDARDISATION AND CLASSIFICATION OF ALERTS GENERATED BY INTRUSION DETECTION SYSTEMS

STANDARDISATION AND CLASSIFICATION OF ALERTS GENERATED BY INTRUSION DETECTION SYSTEMS STANDARDISATION AND CLASSIFICATION OF ALERTS GENERATED BY INTRUSION DETECTION SYSTEMS Athira A B 1 and Vinod Pathari 2 1 Department of Computer Engineering,National Institute Of Technology Calicut, India

More information

Identification of correlated network intrusion alerts

Identification of correlated network intrusion alerts Identification of correlated network intrusion alerts Mirco Marchetti, Michele Colajanni, Fabio Manganiello Department of Information Engineering University of Modena and Reggio Emilia Modena, Italy {mirco.marchetti,

More information

Challenges in Cyber Security Experiments: Our Experience

Challenges in Cyber Security Experiments: Our Experience Challenges in Cyber Security Experiments: Our Experience Annarita Giani, UC Berkeley, George Cybenko, Dartmouth College Vincent Berk, Dartmouth College Eric Renauf, Skaion Outline 1. The Situational Awareness

More information

Enriching intrusion alerts through multi-host causality

Enriching intrusion alerts through multi-host causality Enriching intrusion alerts through multi-host causality Samuel T. King, Z. Morley Mao, Dominic G. Lucchetti, Peter M. Chen Department of Electrical Engineering and Computer Science Computer Science and

More information

Introduction. A. Bellaachia Page: 1

Introduction. A. Bellaachia Page: 1 Introduction 1. Objectives... 3 2. What is Data Mining?... 4 3. Knowledge Discovery Process... 5 4. KD Process Example... 7 5. Typical Data Mining Architecture... 8 6. Database vs. Data Mining... 9 7.

More information

Virtual Terrain: A Security-Based Representation of a Computer Network

Virtual Terrain: A Security-Based Representation of a Computer Network Virtual Terrain: A Security-Based Representation of a Computer Network Jared Holsopple* a, Shanchieh Yang b, Brian Argauer b a CUBRC, 4455 Genesee St, Buffalo, NY, USA 14225; b Dept. of Computer Engineering,

More information

HEURISTICS FOR IMPROVED ENTERPRISE INTRUSION DETECTION. A Dissertation. Presented to. the Faculty of Engineering and Computer Science

HEURISTICS FOR IMPROVED ENTERPRISE INTRUSION DETECTION. A Dissertation. Presented to. the Faculty of Engineering and Computer Science HEURISTICS FOR IMPROVED ENTERPRISE INTRUSION DETECTION A Dissertation Presented to the Faculty of Engineering and Computer Science University of Denver In Partial Fulfillment of the Requirements for the

More information

Understanding Web personalization with Web Usage Mining and its Application: Recommender System

Understanding Web personalization with Web Usage Mining and its Application: Recommender System Understanding Web personalization with Web Usage Mining and its Application: Recommender System Manoj Swami 1, Prof. Manasi Kulkarni 2 1 M.Tech (Computer-NIMS), VJTI, Mumbai. 2 Department of Computer Technology,

More information

Dynamic Rule Based Traffic Analysis in NIDS

Dynamic Rule Based Traffic Analysis in NIDS International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 14 (2014), pp. 1429-1436 International Research Publications House http://www. irphouse.com Dynamic Rule Based

More information

P Principles of Network Forensics P Terms & Log-based Tracing P Application Layer Log Analysis P Lower Layer Log Analysis

P Principles of Network Forensics P Terms & Log-based Tracing P Application Layer Log Analysis P Lower Layer Log Analysis Agenda Richard Baskerville P Principles of P Terms & -based Tracing P Application Layer Analysis P Lower Layer Analysis Georgia State University 1 2 Principles Kim, et al (2004) A fuzzy expert system for

More information

A Model-based Methodology for Developing Secure VoIP Systems

A Model-based Methodology for Developing Secure VoIP Systems A Model-based Methodology for Developing Secure VoIP Systems Juan C Pelaez, Ph. D. November 24, 200 VoIP overview What is VoIP? Why use VoIP? Strong effect on global communications VoIP will replace PSTN

More information

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE PRODUCT BRIEF uugiven today s environment of sophisticated security threats, big data security intelligence solutions and regulatory compliance demands, the need for a log intelligence solution has become

More information

International Journal of Enterprise Computing and Business Systems ISSN (Online) : 2230-8849

International Journal of Enterprise Computing and Business Systems ISSN (Online) : 2230-8849 WINDOWS-BASED APPLICATION AWARE NETWORK INTERCEPTOR Ms. Shalvi Dave [1], Mr. Jimit Mahadevia [2], Prof. Bhushan Trivedi [3] [1] Asst.Prof., MCA Department, IITE, Ahmedabad, INDIA [2] Chief Architect, Elitecore

More information

QSec: Supporting Security Decisions on an IT Infrastructure

QSec: Supporting Security Decisions on an IT Infrastructure QSec: Supporting Security Decisions on an IT Infrastructure [F.Baiardi, F.Tonelli, F.Corò] 1 and L.Guidi 2 1 Dipartimento di Informatica, Università di Pisa 2 ENEL Engineering and Research SpA, Pisa, Italy

More information

Efficiently Managing Firewall Conflicting Policies

Efficiently Managing Firewall Conflicting Policies Efficiently Managing Firewall Conflicting Policies 1 K.Raghavendra swamy, 2 B.Prashant 1 Final M Tech Student, 2 Associate professor, Dept of Computer Science and Engineering 12, Eluru College of Engineeering

More information

A FRAMEWORK FOR AN ADAPTIVE INTRUSION DETECTION SYSTEM WITH DATA MINING. Mahmood Hossain and Susan M. Bridges

A FRAMEWORK FOR AN ADAPTIVE INTRUSION DETECTION SYSTEM WITH DATA MINING. Mahmood Hossain and Susan M. Bridges A FRAMEWORK FOR AN ADAPTIVE INTRUSION DETECTION SYSTEM WITH DATA MINING Mahmood Hossain and Susan M. Bridges Department of Computer Science Mississippi State University, MS 39762, USA E-mail: {mahmood,

More information

Improved Event Logging for Security and Forensics: developing audit management infrastructure requirements

Improved Event Logging for Security and Forensics: developing audit management infrastructure requirements Improved Event Logging for Security and Forensics: developing audit management infrastructure requirements Atif Ahmad & Anthonie Ruighaver University of Melbourne, Australia Abstract The design and implementation

More information

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013 CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015 RESEARCH ARTICLE OPEN ACCESS Data Mining Technology for Efficient Network Security Management Ankit Naik [1], S.W. Ahmad [2] Student [1], Assistant Professor [2] Department of Computer Science and Engineering

More information

Fuzzy Network Profiling for Intrusion Detection

Fuzzy Network Profiling for Intrusion Detection Fuzzy Network Profiling for Intrusion Detection John E. Dickerson (jedicker@iastate.edu) and Julie A. Dickerson (julied@iastate.edu) Electrical and Computer Engineering Department Iowa State University

More information

Network- vs. Host-based Intrusion Detection

Network- vs. Host-based Intrusion Detection Network- vs. Host-based Intrusion Detection A Guide to Intrusion Detection Technology 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free: 800.776.2362 Fax: 678.443.6477

More information

XPROBE. Building Efficient Network Discovery Tools. Fyodor Yarochkin

XPROBE. Building Efficient Network Discovery Tools. Fyodor Yarochkin XPROBE Building Efficient Network Discovery Tools Fyodor Yarochkin Outline Introduction Some motivating stories: real-life attacks Efficient network mapping with Lazy Scan mode Layer 7 extensions Scripting

More information

Network Monitoring and Forensics

Network Monitoring and Forensics Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 2, Issue.

More information

A Review on Network Intrusion Detection System Using Open Source Snort

A Review on Network Intrusion Detection System Using Open Source Snort , pp.61-70 http://dx.doi.org/10.14257/ijdta.2016.9.4.05 A Review on Network Intrusion Detection System Using Open Source Snort Sakshi Sharma and Manish Dixit Department of CSE& IT MITS Gwalior, India Sharmasakshi1009@gmail.com,

More information

HMM Profiles for Network Traffic Classification

HMM Profiles for Network Traffic Classification HMM Profiles for Network Traffic Classification Charles Wright, Fabian Monrose and Gerald Masson Johns Hopkins University Information Security Institute Baltimore, MD 21218 Overview Problem Description

More information

Fuzzy Network Profiling for Intrusion Detection

Fuzzy Network Profiling for Intrusion Detection Fuzzy Network Profiling for Intrusion Detection John E. Dickerson (jedicker@iastate.edu) and Julie A. Dickerson (julied@iastate.edu) Electrical and Computer Engineering Department Iowa State University

More information

Providing Flexible Security as a Service Model for Cloud Infrastructure

Providing Flexible Security as a Service Model for Cloud Infrastructure Providing Flexible Security as a Service Model for Cloud Infrastructure Dr. M. Newlin Rajkumar, P. Banu Priya, Dr. V. Venkatesakumar Abstract Security-as-a-Service model for cloud systems enable application

More information

Analysis of Automated Model against DDoS Attacks

Analysis of Automated Model against DDoS Attacks Analysis of Automated Model against DDoS Attacks Udaya Kiran Tupakula Vijay Varadharajan Information and Networked Systems Security Research Division of Information and Communication Sciences Macquarie

More information

Alert Prioritization in Intrusion Detection Systems

Alert Prioritization in Intrusion Detection Systems Alert Prioritization in Intrusion Detection Systems Khalid Alsubhi, Ehab Al-Shaer, and Raouf Boutaba ( )Davird R. Cheriton School of Computer Science, University of Waterloo, Canada ( )School of Computer

More information

Implementing a Robust Network-Based Intrusion Detection System

Implementing a Robust Network-Based Intrusion Detection System The International Journal Of Engineering And Science (IJES) Volume 3 Issue 10 Pages 01-09 2014 ISSN (e): 2319 1813 ISSN (p): 2319 1805 Implementing a Robust Network-Based Intrusion Detection System 1 Ogheneovo,

More information

Network Intrusion Detection Systems

Network Intrusion Detection Systems Network Intrusion Detection Systems False Positive Reduction Through Anomaly Detection Joint research by Emmanuele Zambon & Damiano Bolzoni 7/1/06 NIDS - False Positive reduction through Anomaly Detection

More information

Double guard: Detecting Interruptions in N- Tier Web Applications

Double guard: Detecting Interruptions in N- Tier Web Applications Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2014-2018 ISSN: 2249-6645 Double guard: Detecting Interruptions in N- Tier Web Applications P. Krishna Reddy 1, T. Manjula 2, D. Srujan Chandra Reddy 3, T. Dayakar

More information

Web Application Security

Web Application Security Web Application Security Richard A. Kemmerer Reliable Software Group Computer Science Department University of California Santa Barbara, CA 93106, USA http://www.cs.ucsb.edu/~rsg www.cs.ucsb.edu/~rsg/

More information

Intrusion Detection System using Log Files and Reinforcement Learning

Intrusion Detection System using Log Files and Reinforcement Learning Intrusion Detection System using Log Files and Reinforcement Learning Bhagyashree Deokar, Ambarish Hazarnis Department of Computer Engineering K. J. Somaiya College of Engineering, Mumbai, India ABSTRACT

More information

Tackling Congestion to Address Distributed Denial of Service: A Push-Forward Mechanism

Tackling Congestion to Address Distributed Denial of Service: A Push-Forward Mechanism Tackling Congestion to Address Distributed Denial of Service: A Push-Forward Mechanism Srinivasan Krishnamoorthy and Partha Dasgupta Computer Science and Engineering Department Arizona State University

More information

A Biologically Inspired Approach to Network Vulnerability Identification

A Biologically Inspired Approach to Network Vulnerability Identification A Biologically Inspired Approach to Network Vulnerability Identification Evolving CNO Strategies for CND Todd Hughes, Aron Rubin, Andrew Cortese,, Harris Zebrowitz Senior Member, Engineering Staff Advanced

More information

NNMi120 Network Node Manager i Software 9.x Essentials

NNMi120 Network Node Manager i Software 9.x Essentials NNMi120 Network Node Manager i Software 9.x Essentials Instructor-Led Training For versions 9.0 9.2 OVERVIEW This course is designed for those Network and/or System administrators tasked with the installation,

More information

Conclusions and Future Directions

Conclusions and Future Directions Chapter 9 This chapter summarizes the thesis with discussion of (a) the findings and the contributions to the state-of-the-art in the disciplines covered by this work, and (b) future work, those directions

More information

DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR

DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Journal homepage: www.mjret.in DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Maharudra V. Phalke, Atul D. Khude,Ganesh T. Bodkhe, Sudam A. Chole Information Technology, PVPIT Bhavdhan Pune,India maharudra90@gmail.com,

More information

How To Understand The Theory Of Alert Correlation

How To Understand The Theory Of Alert Correlation Alert Correlation Survey: Framework and Techniques Reza Sadoddin Network Security Laboratory University of New Brunswick Fredericton, New Brunswick, Canada reza.sadoddin@unb.ca Ali Ghorbani Network Security

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION 21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless

More information

USING LOCAL NETWORK AUDIT SENSORS AS DATA SOURCES FOR INTRUSION DETECTION. Integrated Information Systems Group, Ruhr University Bochum, Germany

USING LOCAL NETWORK AUDIT SENSORS AS DATA SOURCES FOR INTRUSION DETECTION. Integrated Information Systems Group, Ruhr University Bochum, Germany USING LOCAL NETWORK AUDIT SENSORS AS DATA SOURCES FOR INTRUSION DETECTION Daniel Hamburg,1 York Tüchelmann Integrated Information Systems Group, Ruhr University Bochum, Germany Abstract: The increase of

More information

Network IDS Alert Classification with Frequent Itemset Mining and Data Clustering

Network IDS Alert Classification with Frequent Itemset Mining and Data Clustering Network IDS Alert Classification with Frequent Itemset Mining and Data Clustering Risto Vaarandi and Krlis Podiš Copyright 2010 IEEE. Personal use of this material is permitted. However, permission to

More information

An analysis of suitable parameters for efficiently applying K-means clustering to large TCPdump data set using Hadoop framework

An analysis of suitable parameters for efficiently applying K-means clustering to large TCPdump data set using Hadoop framework An analysis of suitable parameters for efficiently applying K-means clustering to large TCPdump data set using Hadoop framework Jakrarin Therdphapiyanak Dept. of Computer Engineering Chulalongkorn University

More information

A Symptom Extraction and Classification Method for Self-Management

A Symptom Extraction and Classification Method for Self-Management LANOMS 2005-4th Latin American Network Operations and Management Symposium 201 A Symptom Extraction and Classification Method for Self-Management Marcelo Perazolo Autonomic Computing Architecture IBM Corporation

More information

How To Protect A Network From Attack From A Hacker (Hbss)

How To Protect A Network From Attack From A Hacker (Hbss) Leveraging Network Vulnerability Assessment with Incident Response Processes and Procedures DAVID COLE, DIRECTOR IS AUDITS, U.S. HOUSE OF REPRESENTATIVES Assessment Planning Assessment Execution Assessment

More information

Analysis of Traceback Techniques

Analysis of Traceback Techniques Analysis of Traceback Techniques Udaya Kiran Tupakula Vijay Varadharajan Information and Networked Systems Security Research Division of ICS, Macquarie University North Ryde, NSW-2109, Australia {udaya,

More information

Preprocessing Web Logs for Web Intrusion Detection

Preprocessing Web Logs for Web Intrusion Detection Preprocessing Web Logs for Web Intrusion Detection Priyanka V. Patil. M.E. Scholar Department of computer Engineering R.C.Patil Institute of Technology, Shirpur, India Dharmaraj Patil. Department of Computer

More information

IDS / IPS. James E. Thiel S.W.A.T.

IDS / IPS. James E. Thiel S.W.A.T. IDS / IPS An introduction to intrusion detection and intrusion prevention systems James E. Thiel January 14, 2005 S.W.A.T. Drexel University Overview Intrusion Detection Purpose Types Detection Methods

More information

Firewall Configuration based on Specifications of Access Policy and Network Environment

Firewall Configuration based on Specifications of Access Policy and Network Environment Firewall Configuration based on Specifications of Access Policy and Network Environment A. Titov, V. Zaborovsky Saint-Petersburg State Polytechnical University, Russia avt@npo-rtc.ru, vlad@neva.ru Abstract

More information

An Approach to Understand the End User Behavior through Log Analysis

An Approach to Understand the End User Behavior through Log Analysis An Approach to Understand the End User Behavior through Log Analysis Nikhil Kumar Singh Department of Computer Science and Engineering Maulana Azad National Institute of Technology Bhopal, India Deepak

More information

Outline Intrusion Detection CS 239 Security for Networks and System Software June 3, 2002

Outline Intrusion Detection CS 239 Security for Networks and System Software June 3, 2002 Outline Intrusion Detection CS 239 Security for Networks and System Software June 3, 2002 Introduction Characteristics of intrusion detection systems Some sample intrusion detection systems Page 1 Page

More information

Data Mining & Data Stream Mining Open Source Tools

Data Mining & Data Stream Mining Open Source Tools Data Mining & Data Stream Mining Open Source Tools Darshana Parikh, Priyanka Tirkha Student M.Tech, Dept. of CSE, Sri Balaji College Of Engg. & Tech, Jaipur, Rajasthan, India Assistant Professor, Dept.

More information

An Efficient Way of Denial of Service Attack Detection Based on Triangle Map Generation

An Efficient Way of Denial of Service Attack Detection Based on Triangle Map Generation An Efficient Way of Denial of Service Attack Detection Based on Triangle Map Generation Shanofer. S Master of Engineering, Department of Computer Science and Engineering, Veerammal Engineering College,

More information

Data Leakage: What You Need to Know

Data Leakage: What You Need to Know Data Leakage: What You Need to Know by Faith M. Heikkila, Pivot Group Information Security Consultant Data leakage is a silent type of threat. Your employee as an insider can intentionally or accidentally

More information

Service Monitoring and Alarm Correlations

Service Monitoring and Alarm Correlations Service Monitoring and Alarm Correlations Oliver Jukić Virovitica College Virovitica, Republic of Croatia oliver.jukic@vsmti.hr Ivan Heđi Virovitica College Virovitica, Republic of Croatia ivan.hedi@vsmti.hr

More information

Basic & Advanced Administration for Citrix NetScaler 9.2

Basic & Advanced Administration for Citrix NetScaler 9.2 Basic & Advanced Administration for Citrix NetScaler 9.2 Day One Introducing and deploying Citrix NetScaler Key - Brief Introduction to the NetScaler system Planning a NetScaler deployment Deployment scenarios

More information

Mining and Detecting Connection-Chains in Network Traffic

Mining and Detecting Connection-Chains in Network Traffic Mining and Detecting Connection-Chains in Network Traffic Ahmad Almulhem and Issa Traore ISOT Research Lab, ECE Department, University of Victoria, Victoria, CANADA Summary. A connection-chain refers to

More information

A Novel Packet Marketing Method in DDoS Attack Detection

A Novel Packet Marketing Method in DDoS Attack Detection SCI-PUBLICATIONS Author Manuscript American Journal of Applied Sciences 4 (10): 741-745, 2007 ISSN 1546-9239 2007 Science Publications A Novel Packet Marketing Method in DDoS Attack Detection 1 Changhyun

More information

Automated Medical Citation Records Creation for Web-Based On-Line Journals

Automated Medical Citation Records Creation for Web-Based On-Line Journals Automated Medical Citation Records Creation for Web-Based On-Line Journals Daniel X. Le, Loc Q. Tran, Joseph Chow Jongwoo Kim, Susan E. Hauser, Chan W. Moon, George R. Thoma National Library of Medicine,

More information

Intrusion Detection. Overview. Intrusion vs. Extrusion Detection. Concepts. Raj Jain. Washington University in St. Louis

Intrusion Detection. Overview. Intrusion vs. Extrusion Detection. Concepts. Raj Jain. Washington University in St. Louis Intrusion Detection Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/

More information

The Essentials Series. PCI Compliance. sponsored by. by Rebecca Herold

The Essentials Series. PCI Compliance. sponsored by. by Rebecca Herold The Essentials Series PCI Compliance sponsored by by Rebecca Herold Using PCI DSS Compliant Log Management to Identify Attacks from Outside the Enterprise...1 Outside Attacks Impact Business...1 PCI DSS

More information

Automatic Generation of Correlation Rules to Detect Complex Attack Scenarios

Automatic Generation of Correlation Rules to Detect Complex Attack Scenarios Automatic Generation of Correlation Rules to Detect Complex Attack Scenarios Erwan Godefroy, Eric Totel, Michel Hurfin, Frédéric Majorczyk To cite this version: Erwan Godefroy, Eric Totel, Michel Hurfin,

More information

Computer Network Intrusion Detection, Assessment And Prevention Based on Security Dependency Relation

Computer Network Intrusion Detection, Assessment And Prevention Based on Security Dependency Relation Computer Network Intrusion Detection, Assessment And Prevention Based on Security Dependency Relation Stephen S. Yau and Xinyu Zhang Computer Science and Engineering Department Arizona State University

More information

Transformation of honeypot raw data into structured data

Transformation of honeypot raw data into structured data Transformation of honeypot raw data into structured data 1 Majed SANAN, Mahmoud RAMMAL 2,Wassim RAMMAL 3 1 Lebanese University, Faculty of Sciences. 2 Lebanese University, Director of center of Research

More information

Alert Correlation through Triggering Events and Common Resources

Alert Correlation through Triggering Events and Common Resources Alert Correlation through Triggering Events and Common Resources Dingbang Xu and Peng Ning Cyber Defense Laboratory Department of Computer Science North Carolina State University Raleigh, NC 27695-8207

More information

AlienVault Unified Security Management Solution Complete. Simple. Affordable Life Cycle of a log

AlienVault Unified Security Management Solution Complete. Simple. Affordable Life Cycle of a log Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat

More information

Big Data Architectures: Concerns and Strategies for Cyber Security

Big Data Architectures: Concerns and Strategies for Cyber Security Big Data Architectures: Concerns and Strategies for Cyber Security David Blockow Software Architect, Data to Decisions CRC david.blockow@d2dcrc.com.au au.linkedin.com/in/davidblockow Executive summary.

More information